Use A Uuid To Generate Encryption Key 4,8/5 7406 votes
  1. Use A Uuid To Generate Encryption Key Generator

In this post, based on what we already know about Master Key encryption, we look into how Master Key rotation works. The idea behind Master Key rotation is that we want to generate a new Master Key and use this new Master Key to re-encrypt the tablespace key (stored in tablespace’s header). Jul 17, 2018 A key pair is generated, and a file named FileVaultMaster.keychain is saved to your desktop. Copy this file to a secure location, such an encrypted disk image on an external drive. This secure copy is the private recovery key that can unlock the startup disk of any Mac set up to use the FileVault master keychain. It is not for distribution.

These advanced steps are for system administrators and others who are familiar with the command line.

Create a FileVault master keychain

  1. Open the Terminal app on your Mac, then enter this command:
  2. When prompted, enter the master password for the new keychain, then enter it again when prompted to retype. Terminal doesn't show the password as you type.
  3. A key pair is generated, and a file named FileVaultMaster.keychain is saved to your desktop. Copy this file to a secure location, such an encrypted disk image on an external drive. This secure copy is the private recovery key that can unlock the startup disk of any Mac set up to use the FileVault master keychain. It is not for distribution.
Encryption

In the next section, you will update the FileVaultMaster.keychain file that is still on your desktop. You can then deploy that keychain to Mac computers in your institution.

Remove the private key from the master keychain

After creating the FileVault master keychain, follow these steps to prepare a copy of it for deployment:

  1. Double-click the FileVaultMaster.keychain file on your desktop. The Keychain Access app opens.
  2. In the Keychain Access sidebar, select FileVaultMaster. If you see more than two items listed on the right, select another keychain in the sidebar, then select FileVaultMaster again to refresh the list.
  3. If the FileVaultMaster keychain is locked, click in the upper-left corner of Keychain Access, then enter the master password you created.
  4. From the two items shown on the right, select the one identified as ”private key” in the Kind column:
  5. Delete the private key: Choose Edit > Delete from the menu bar, enter the keychain master password, then click Delete when asked to confirm.
  6. Quit Keychain Access.

Now that the master keychain on your desktop no longer contains the private key, it's ready for deployment.

Deploy the updated master keychain on each Mac

After removing the private key from the keychain, follow these steps on each Mac that you want to be able to unlock with your private key.

  1. Put a copy of the updated FileVaultMaster.keychain file in the /Library/Keychains/ folder.
  2. Open the Terminal app and enter both of the following commands. These commands make sure that the file's permissions are set to -rw-r--r-- and the file is owned by root and assigned to the group named wheel.
  3. If FileVault is already turned on, enter this command in Terminal:
  4. If FileVault is turned off, open Security & Privacy preferences and turn on FileVault. You should see a message that a recovery key has been set by your company, school, or institution. Click Continue.

This completes the process. If a user forgets their macOS user account password and can't log in to their Mac, you can use the private key to unlock their disk.

Use the private key to unlock a user's startup disk

If a user forgot their account password and can't log in to their Mac, you can use the private recovery key to unlock their startup disk and access its FileVault-encrypted data. /generate-ssh-key-windows-8-git.html.

  1. On the client Mac, start up from macOS Recovery by holding Command-R during startup.
  2. If you don't know the name (such as Macintosh HD) and format of the startup disk, open Disk Utility from the macOS Utilities window, then check the information Disk Utility shows for that volume on the right. If you see ”CoreStorage Logical Volume Group” instead of ”APFS Volume” or ”Mac OS Extended,” the format is Mac OS Extended. You will need this information in a later step. Quit Disk Utility when done.
  3. Connect the external drive that contains the private recovery key.
  4. From the menu bar in macOS Recovery, choose Utilities > Terminal.
  5. If you stored the private recovery key in an encrypted disk image, use the following command in Terminal to mount that image. Replace /path with the path to the disk image, including the .dmg filename extension:
    Example for a disk image named PrivateKey.dmg on a volume named ThumbDrive:
    hdiutil attach /Volumes/ThumbDrive/PrivateKey.dmg
  6. Use the following command to unlock the FileVault master keychain. Replace /path with the path to FileVaultMaster.keychain on the external drive. In this step and all remaining steps, if the keychain is stored in an encrypted disk image, remember to include the name of that image in the path.
    Example for a volume named ThumbDrive:
    security unlock-keychain /Volumes/ThumbDrive/FileVaultMaster.keychain

  7. Enter the master password to unlock the startup disk. If the password is accepted, the command prompt returns.

Continue as described below, based on how the user's startup disk is formatted.

APFS

If the startup disk is formatted for APFS, complete these additional steps:

  1. Enter the following command to unlock the encrypted startup disk. Replace 'name' with the name of the startup volume, and replace /path with the path to FileVaultMaster.keychain on the external drive or disk image:
    Example for a startup volume named Macintosh HD and a recovery-key volume named ThumbDrive:
    diskutil ap unlockVolume 'Macintosh HD' -recoveryKeychain /Volumes/ThumbDrive/FileVaultMaster.keychain
  2. Enter the master password to unlock the keychain and mount the startup disk.
  3. Use command-line tools such as ditto to back up the data on the disk, or quit Terminal and use Disk Utility.

Mac OS Extended (HFS Plus)

If the startup disk is formatted for Mac OS Extended, complete these additional steps:

  1. Enter this command to get a list of drives and CoreStorage volumes:
  2. Select the UUID that appears after “Logical Volume,” then copy it for use in a later step.
    Example: +-> Logical Volume 2F227AED-1398-42F8-804D-882199ABA66B
  3. Use the following command to unlock the encrypted startup disk. Replace UUID with the UUID you copied in the previous step, and replace /path with the path to FileVaultMaster.keychain on the external drive or disk image:
    Example for a recovery-key volume named ThumbDrive:
    diskutil cs unlockVolume 2F227AED-1398-42F8-804D-882199ABA66B -recoveryKeychain /Volumes/ThumbDrive/FileVaultMaster.keychain
  4. Enter the master password to unlock the keychain and mount the startup disk.
  5. Use command-line tools such as ditto to back up the data on the disk. Or quit Terminal and use Disk Utility. Or use the following command to decrypt the unlocked disk and start up from it.
    Example for a recovery-key volume named ThumbDrive:
    diskutil cs decryptVolume 2F227AED-1398-42F8-804D-882199ABA66B -recoveryKeychain /Volumes/ThumbDrive/FileVaultMaster.keychain
Return to NavigationUse A Uuid To Generate Encryption Key

You use the PSCipherJava utility's buildkey command to build new Triple DES encryption keys.The buildkey command adds a new Triple DES encryption key stored in the psvaultfile (the key file). If you generate new versions of the key file,the system appends the new version of the key to the end of the keyfile.

To invoke the commandon a Windows server, change to the directory where PSCipher residesand enter:

To invoke the commandon UNIX, change to the directory where PSCipher resides and enter:

Select one web serverin your system to generate the new version of the key file. The pscipher.batand PSCipher.sh utilities only run in the Java environment of theweb server. After you have created the new key file, you then copythe new version of psvault from the initial server to the appropriatedirectories on all the appropriate servers in your system. The psvaultfile is stored in different directories depending on your web servervender (as described in the following sections). On the applicationserver the psvault file resides in <PS_HOME>secvault.

Note: If you are not usingthe default encryption key and you have generated a unique encryptionkey, note that each time you add a new server to your system, youwill need to copy the key file to the appropriate location on thatserver. For example, if you are using the default key version ({V1.1}),any server you add to the system and install PeopleTools on will alsohave the default key version ({V1.1}). As such, no further steps arerequired. However, if you have generated a new key, giving the versionnumber a value of {V1.2} or greater, then you need to make sure tocopy that key file to the added server(s). Also, each time you updatethe key, you need to ensure that the new version of the key file iscopied to the additional servers in your system.

Use A Uuid To Generate Encryption Key Generator

Warning! When you upgrade tonew PeopleTools releases, as in PeopleTools 8.48 to PeopleTools 8.50,you will need to backup any modifications you have made to the keyfile using PSCipher in the previous release and reapply that samekey file to the appropriate servers onto which you have installedthe new PeopleTools release.

Coments are closed
Scroll to top